E-mail signature block segmentation

Hu , et al. March 19, 2

Patent Grant 6360010

U.S. patent number 6,360,010 [Application Number 09/132,683] was granted by the patent office on 2002-03-19 for e-mail signature block segmentation. This patent grant is currently assigned to Lucent Technologies, Inc.. Invention is credited to Hao Chen, Jianying Hu, Richard W. Sproat.


United States Patent 6,360,010
Hu ,   et al. March 19, 2002

E-mail signature block segmentation

Abstract

A technique for segmenting a loosely constrained text block, such as an e-mail signature block into sub-blocks by performing line segment extraction and connected component analysis on the foreground characters and background characters and recursively repeating connected component analysis on both the foreground and background characters and line segment extraction on the background characters until a text output includes no mixed reading blocks. A technique for correcting over segmentation errors in a line of text from a loosely constrained text block which has undergone geometrical analysis.


Inventors: Hu; Jianying (Westfield, NJ), Sproat; Richard W. (Berkeley Heights, NJ), Chen; Hao (Doval, CA)
Assignee: Lucent Technologies, Inc. (Murray Hill, NJ)
Family ID: 22455119
Appl. No.: 09/132,683
Filed: August 12, 1998

Current U.S. Class: 382/180; 358/464; 382/176
Current CPC Class: G06K 9/00469 (20130101); G06K 9/6885 (20130101); G06K 9/00463 (20130101)
Current International Class: G06K 9/20 (20060101); G06K 9/68 (20060101); G06K 009/34 ()
Field of Search: ;382/101,102,180,176,173,177 ;358/462,464,465,467 ;709/206

References Cited [Referenced By]

U.S. Patent Documents
5631984 May 1997 Graf et al.
5781884 July 1998 Pereira et al.
5892843 April 1999 Zhou et al.
6021202 February 2000 Anderson et al.
6061718 May 2000 Nelson

Other References

Wang, D. et al, Computer VIsion, Graphics & Image Processing 47, 327-352 (1989). .
Porter, G. et al, Xerox Corp. Webster Research Center, 1992, pp. 127-141. .
Nagy, G. et al, Computer, 1992 IEEE, pp. 10-21. .
Takasu, A. et al, Research & Development Dept., Tokyo, Japan, pp. 463-466. .
Pavlidis et al, CVGIP: Graphical Models & Image Processing, vol. 54, No. 6, Nov., pp. 484-496, 1992. .
Srihari, S. et al, AI Magazine, Winter, pp. 25-40. .
Baird, H. Proceedings of the IEEE, vol. 80, No. 7, Jul. 1992, pp. 1059-1065. .
Horowitz, E. et al, Fundamentals of Data Structures IN C++, Computer Science Press. .
Pavlidis, T., Computer Science Press. .
Dengel, A. et al, International Journal of Pattern Recognition and Artifical Intelligence, vol. 2, No. 4 (1988), 641-655..

Primary Examiner: Chang; Jon
Assistant Examiner: Wu; Jingge

Claims



What is claimed is:

1. A method of dividing a loosely constrained text block into reading blocks, comprising the steps of:

(a) performing line segment extraction on foreground characters in the loosely constrained text block;

(b) performing connected component analysis on the foreground characters in the loosely constrained text block;

(c) performing line segment extraction on background characters in the loosely constrained text block;

(d) performing connect component analysis on the background characters in the loosely constrained text block to produce a text output; and

(e) recursively repeating said steps (b)-(d) until the text output of said step (d) includes no mixed reading blocks.

2. The method of claim 1, wherein said method is part of a preprocess performed in e-mail text-to-speech rendering.

3. The method of claim 1, wherein the loosely constrained text block is an e-mail message signature block.

4. A processor for dividing a loosely constrained text block into reading blocks, comprising:

a foreground line segment extraction processing unit for performing line segment extraction on foreground characters in the loosely constrained text block;

a foreground connected component analysis processing unit for performing connected component analysis on the foreground characters in the loosely constrained text block;

a background line segment extraction processing unit for performing line segment extraction on background characters in the loosely constrained text block; and

a background connected component processing unit for performing connect component analysis on the background characters in the loosely constrained text block to produce a text output;

wherein said foreground connected component analysis processing unit, said background line segment extraction processing unit, and said background connected component analysis processing unit recursively process the loosely constrained text block until the text output of said background connected component analysis processing unit includes no mixed reading blocks.

5. The processor of claim 4, wherein said processor is part of a preprocessor performed in e-mail text-to-speech rendering.

6. The processor of claim 4, wherein the loosely constrained text block is an e-mail message signature block.

7. A computer program embodied on a computer-readable medium for dividing a loosely constrained text block into reading blocks, comprising:

a foreground line segment extraction source code segment for performing line segment extraction on foreground characters in the loosely constrained text block;

a foreground connected component analysis source code segment for performing connected component analysis on the foreground characters in the loosely constrained text block;

a background line segment extraction source code segment for performing line segment extraction on background characters in the loosely constrained text block; and

a background connected component analysis source code segment performing connect component analysis on the background characters in the loosely constrained text block to produce a text output;

wherein said foreground connected component analysis source code segment, said background line segment extraction source code segment, and said background connected component analysis source code segment recursively process the loosely constrained text block until the text output of said background connected component analysis source code segment includes no mixed reading blocks.

8. The computer program of claim 7, wherein said computer program is a preprocess performed in e-mail text-to-speech rendering.

9. The computer program of claim 7, wherein the loosely constrained text block is an e-mail message signature block.
Description



BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to the segmentation of signature blocks, and more particularly, to the segmentation of signature blocks of e-mail messages, combining geometrical layout features and language constraints using finite state transducers.

2. Description of the Related Art

The rapidly increasing usage of the Internet in recent years has made electronic mail (e-mail) one of the most common forms of business and personal communication. How to manage the large and dynamic collection of e-mail documents for efficient storage and information retrieval, and how to convert between e-mail and other forms of messages (e.g., voice mail and fax) to allow convenient access when and where the user needs, are two of the most important research areas in multimedia messaging.

The content of modern-day e-mail has expanded beyond text to include encoded documents, images, even audio and video clips. However, unmarked text is still the prevailing format for e-mail communications due to its simplicity, and sufficiency in terms of conveying ideas, conducting discussions, making announcements, etc. One of the most common elements in text e-mail is the signature block. The signature block contains information about the sender, such as e-mail address, web address, phone/fax number, personal name, postal address, etc., and is usually separated from the rest of the message by some sort of border. Accurate identification and parsing of signature blocks is important for many multimedia messaging applications such as e-mail text-to-speech rendering, automatic construction of personal address databases, and interactive message retrieval.

Automatic conversion of e-mail into speech is one of the most important commercial applications of text-to-speech technology, and is one technological component of the growing interest in media conversion.

Document layout segmentation and logical structure analysis have been studied by many researchers in the context of understanding printed documents, including journal pages, newspaper articles, business letters, mail pieces, forms, catalogs, etc. While in some sense, e-mail text can be viewed as a special form of printed document, there are important differences. Since e-mails are not formal publications, there are few rules regarding the layout structure of signature blocks. This high degree of variability makes layout segmentation a difficult task.

Many different approaches have been developed for printed document layout segmentation, which can be roughly defined as the segmentation of a document page into blocks of coherent content. The most notable approaches include the recursive projection profile cuts method, as disclosed, for example, in "Document analysis with an expert system," G. Nagy et al., In Proc. Pattern Recognition in Practice II (Amsterdam, June 1985), the approach based on maximal white rectangles, as disclosed, for example in "Image segmentation using shape-directed covers," H. S. Baird et al., In Proc. 10th Int. Conf. Pattern Recognition (Atlantic City, N.J., June 1990) and other methods based on the analysis of background white spaces, as disclosed, for example, in "Page segmentation by white streams," T. Pavlidis, In Proc. Int. Conf. Document Analysis and Recognition (1991), pp. 945-953.

Each of these techniques relies, to a different extent, on assumptions about the generic document layout structure, particularly rectangularity of text blocks and white spacing around each block. Unfortunately, such assumptions do not always hold in the case of e-mail signature blocks. Often, e-mail signature blocks contain non-rectangular blocks which cannot be separated by a vertical cut. Other e-mail signature blocks include different layout structures, either one or two columns, which are placed directly on top of each other with no white space in between.

Fewer studies have been conducted on logical layout analysis, which involves functional labeling of document blocks. Previous approaches rely on geometric features alone. Some previous approaches have used texture analysis where other visual features such as font size, location and aspect ratio of the block, indentation attributes of the block, etc. to distinguish text blocks from imaging graphics, or to assign high level labels to text blocks such as titles, captions, paragraphs, itemized lists, tables, etc., as disclosed, for example, in "Classification of newspaper image blocks using texture analysis," D. Wang et al., Computer Vision, Graphics and Image Processing 47 (1989), pp. 327-352.

The features used in these approaches do not always translate to e-mail documents. Furthermore, finer logical labels are not obtained by such analysis. Utilizing the technique disclosed in "Document reconstruction: a system for recovering document structure from layout," G. B. Porter et al., In Proc. Conference on Electronic Publishing (1992), pp. 127-141, more details of logical layout structure are recovered using labels provided in a particular formatting language, such as Latex or PostScript. However, this method does not apply to generic, unmarked documents.

Other researchers have applied more detailed domain knowledge in the form of block grammars, as disclosed, for example, in "A prototype document image analysis system for technical journals," G. Nagy et al., Computer (July 1992), pp. 10-22, array grammars, as disclosed, for example, in "A document understanding method for database construction of an electronic library," A. Takasu et al., In Proc. 12th CVPR (1994), pp. 263-466, geometric trees, as disclosed, for example, in "High level document analysis guided by geometric aspects," A. Dengel et al., International Journal of Pattern Recognition and Artificial Intelligence 2, 4 (1988), pp. 641-655, or specialized tools, as disclosed, for example, in "Recognizing address blocks on mail pieces: specialized tools and problem-solving architecture," S. N. Srihari et al., AI magazine (Winter 1987), pp. 25-40 to obtain finer level logical labels in specific document forms such as business letters, pages from a particular journal, and postal pieces based on strict layout rules.

However, these techniques cannot be applied to e-mail signature block analysis, where the layout design is highly unconstrained and geometric attributes alone are not sufficient to distinguish between different functional entities, such as postal address and phone numbers.

The segmentation of signature blocks is a very challenging task due to the fact that signature blocks often appear in complex two-dimensional layouts which are guided only by loose conventions. Table 1 shows one example of such a layout.

TABLE 1 An exemplary signature block _ /.vertline. Vinod Anupam email: anupam@ research.bell-labs.com '0.o' Bell Labs, Lucent Tech. www:http://www.tempo. lucent.com/"anupam =(.sub.-- -- --)= 700 Mountain Ave., Rm 2C-236A phone: (908) 582-7366 U Murray Hill, NJ 07974-0636 fax: (908) 582-5809

SUMMARY OF THE INVENTION

The present invention solves the above-identified problems with segmentation of highly unconstrained text blocks, such as e-mail signature blocks, by performing a recursive foreground-background connected component analysis to segment unconventional layout structures. In the present invention, loose geometric layout conventions are integrated with linguistic analysis to achieve reliable logical labeling of all major functional classes encountered in e-mail signature blocks.

The present invention also corrects for over-segmentation errors in text, which are caused by a geometric analysis. A finite state transducer (FST) is constructed which incorporates all possible segmentation positions within a line of text under consideration, as well as the feature scores of the proposed segments. The FST is then composed with another FST which represents language constraints. A bestpath search through the composed FST then yields the optimal segmentation positions.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a hierarchical text structure in one embodiment of the present invention;

FIG. 2 illustrates a flowchart of the signature block analysis in one embodiment of the present invention;

FIG. 3 illustrates the geometrical analysis in one embodiment of the present invention;

FIG. 4 illustrates the decomposition of a mixed reading block into reading blocks;

FIG. 5 illustrates the language analysis in one embodiment of the present invention;

FIG. 6 illustrates an exemplary lexicon weighted finite state transducer (WFST);

FIGS. 7 and 8 illustrate an exemplary finite state acceptor (FSA);

FIG. 9 illustrates an exemplary reading block and its corresponding input weighted finite state transducer (WFST);

FIG. 10 illustrates an exemplary input WFST including segmentation positions;

FIG. 11 illustrates an exemplary grammar WFST in one embodiment of the present invention;

FIG. 12 illustrates an e-mail text-to-speech rendering system in which the signature block identification and analysis apparatus is implemented;

FIG. 13 illustrates an exemplary WFST for signature block identification; and

FIG. 14 illustrates an exemplary technique for performing signature block identification.

DETAILED DESCRIPTION OF THE INVENTION

An e-mail signature block usually appears at the end of a message, although it may also be in the middle of a message if there is a postscript or quoted message. As illustrated in Tables 2-5, signature blocks have unlimited formats and are used to indicate contact information, such as e-mail address, web address, phone and fax numbers, name, postal address, and even some quotes and other miscellaneous text.

TABLE 2 One column layout of a signature block $ Andy Elms -- Tel: +44 1483 300800 x2753 -- Fax: +44 1483 34139 /$ $$ Dept. of Elec. Eng., University of Surrey, GUILDFORD, GU2 5XH, UK. /$$ $$$ A.Elms@ee.surrey.ac.uk -- http://www.ee.surrey.ac.uk/Personal/ A.Elms /$$$

TABLE 2 One column layout of a signature block $ Andy Elms -- Tel: +44 1483 300800 x2753 -- Fax: +44 1483 34139 /$ $$ Dept. of Elec. Eng., University of Surrey, GUILDFORD, GU2 5XH, UK. /$$ $$$ A.Elms@ee.surrey.ac.uk -- http://www.ee.surrey.ac.uk/Personal/ A.Elms /$$$

TABLE 4 Variable number of columns layout of a signature block ------------------- mailto:lyon@research.apple.com------------------- .vertline. Dick Lyon Distinguished Scientist .vertline. .vertline. Apple Computer 301-DM Apple Research Labs .vertline. .vertline. One Infinite Loop phone: (408) 974-4245 .vertline. .vertline. Cupertino CA 95014 fax: (408) 974-8414 .vertline. --------------http://www.research.apple.com/personal/lyon/----------

TABLE 4 Variable number of columns layout of a signature block ------------------- mailto:lyon@research.apple.com------------------- .vertline. Dick Lyon Distinguished Scientist .vertline. .vertline. Apple Computer 301-DM Apple Research Labs .vertline. .vertline. One Infinite Loop phone: (408) 974-4245 .vertline. .vertline. Cupertino CA 95014 fax: (408) 974-8414 .vertline. --------------http://www.research.apple.com/personal/lyon/----------

Unlike other parts of the e-mail message, the signature block is highly unconstrained in that it is quite personalized and there are almost no style restrictions. As a result, analysis of an e-mail signature block presents both geometrical and linguistic problems.

Geometrical properties indicate the reading sequence in a signature block. The simplest layout of a signature block has only one column and is read from top to bottom, and left to right on each line (Table 2). However, for esthetic reasons, and to shrink the length, signature blocks often have rather complicated layouts. Table 3 shows a two-column layout where the first column must be read before the second column. Table 4 shows another example where the number of columns varies from top to the bottom. There is only one column at the top line and the bottom line, however, two columns are juxtaposed in the middle. In Table 5, the columns are not rectangularly shaped. The unconstrained nature of signature block formats significantly complicates the analysis task.

Regarding language complexity, some components of the signature block, such as e-mail and web addresses, have strict patterns and are easily recognizable. Others, such as personal names and postal addresses, have few lexical constraints. Worse yet, there are occasionally quotes or other miscellaneous text in the signature blocks, which have no lexical constraints at all. Humans identify these components by the semantics of natural language. However, natural language understanding by computer is, as yet, an unsolved problem.

Before continuing, several terms used throughout this application must be defined. A signature block, as shown in Tables 1-5, is part of an e-mail message. The signature block is comprised of several continuous lines of text which are used primarily to indicate personal contact information. A signature block may be decomposed into reading blocks. Reading blocks ensure the coherence of text. Text in a reading block can be read out in a meaningful order by simply following the sequence from top to bottom, and from left to right on each line. Text in one reading block is normally read out completely before proceeding to another reading block. Interleaving reading between reading blocks is deprecated. A reading block is decomposed further into functional blocks. Text in each functional block belongs to the same functional class. Ten functional classes are defined in one embodiment of the present invention:

(1) e-mail address,

(2) web address,

(3) phone number,

(4) fax number,

(5) personal name,

(6) postal address,

(7) title,

(8) quote,

(9) stub (auxiliary words, such as "home" or "office" before or after a phone number), and

(10) miscellaneous text.

Any text that is not related to any of the first nine functional classes is miscellaneous text. Signature blocks, reading blocks, and functional blocks constitute a hierarchical text structure.

As illustrated in FIG. 1, the signature block 10 is decomposed into reading block 101, which includes the personal name and postal address and reading block 102, which includes the phone number, fax number, and e-mail address. Reading block 101 is further decomposed into functional block 1011, which includes the personal name and functional block 1012 which includes the postal address. Similarly, reading block 102 is decomposed into functional block 1021, which includes the phone number, functional block 1022, which includes the e-mail address, and functional block 1023, which includes the fax number.

A flowchart of the signature block analysis of the present invention in one embodiment, is shown in FIG. 2. The input is a signature block 10 extracted from a message with TAB keys expanded. Then, geometrical analysis 12 and language analysis 14 are performed to break signature block 10 down into several reading blocks 16 and then several functional blocks 18, each related to one of the ten functional classes described above.

The two major steps of the present invention are the geometrical analysis 12 and language analysis 14.

The geometrical analysis 12 breaks a signature block down to several reading blocks. By doing this, the geometric analysis 12 ensures the coherence of text inside a reading block. Text in a reading block can be read out simply from top to bottom, and left to right on each line. The geometrical analysis 12 shrinks the dimensionality of the analysis problem by converting the two-dimensional signature block into a one-dimensional reading block which makes the following language analysis 14 possible.

The language analysis 14 breaks a reading block into several functional blocks and determines each functional blocks' functional classes. This is done by applying a Weighted Finite State Transducer (WFST) with lexical and grammatical constraints.

1. Geometrical Analysis 12

The geometrical analysis 12 breaks a signature block 10 down to one or more reading blocks 16, where text in each reading block 16 can be read out continuously.

The geometrical analysis 12 is illustrated in more detail in FIG. 3. A geometrical analysis 12 includes a foreground line segment extraction 124, a foreground connected component analysis 126, and an optional mixed reading block analysis 128, which are described in more detail below.

1.1 Line Segment Extraction 124

The line segment extraction 124 breaks down a line of text into several line segments where characters in the same line segment should belong to the same reading block, but different line segments may or may not be in the same reading block. Obviously, characters that are close to each other (such as the characters in the first line in the same column of Table 4) should be contained in the same line segment, whereas visually separated characters (such as characters in the first line in different columns of Table 4) should be divided into different line segments. The following rules are used in the line segment extraction 124:

two adjacent alphanumerics (A-Z, a-z, and 0-9) should be in the same line segment, and

for each pair of alphanumerics that are separated only by non-alphanumerics, the disconnectedness score of each of the intervening non-alphanumerics is summed. If the sum is greater than a threshold, the two alphanumerics should be separated into different line segments. Otherwise, they should be contained in the same line segment.

The disconnectedness score is assigned to each non-alphanumeric to quantitatively segment characters. Some characters are used to indicate a visual segmentation point, such as ".vertline." and "," and they are assigned high positive values as their disconnectedness score. Some characters, such as ":" and "-", visually indicate a connection and they are assigned high negative values. Therefore, a highly positive sum of disconnectedness scores indicates a likely segmentation point, whereas a highly negative sum indicates a likely connection point.

However, certain segmentation ambiguities cannot be resolved completely using geometrical information alone. These are further analyzed with language information, taken into account in the language analysis 14 discussed below.

1.2 Foreground Connected Component Analysis 126

The line segment extraction 124 horizontally connects closely related individual characters into line segments. The next step is to extract vertically connected line segments, using the foreground connected component analysis 126.

Text in a reading block 16 is usually grouped together, which is easily identified, using a conventional connected component analysis technique. However, there are cases where different reading blocks are connected (as shown in Table 4) and the conventional connected component analysis technique will not suffice.

There are several algorithms for the connected component analysis. In a preferred embodiment, the Line Adjacency Graph (LAG) algorithm is disclosed in "Algorithms for Graphics and Image Processing," T. Pavlidis, Computer Science Press, 1982, is utilized.

The LAG algorithm is a bottom-up approach, where each line in the text is broken into several line segments. Overlapping line segments on adjacent lines are placed into the same connected component and all line segments in a connected component are found from the transitive closure.

In the conventional LAG algorithm, two line segments on adjacent lines are considered vertically connected if they overlap, i.e. they have at least one x-coordinate in common. However, this simple rule causes some problems in signature block analysis. In Table 4, although the line segment on the first line overlaps with each of the line segments on the second line, they actually belong to different reading blocks. For human vision, two vertically adjacent line segments must overlap considerably to have the effect of being visually connected, which is reflected in the definition of vertical connectedness.

Two line segments L.sub.1 ((x.sub.A,y)) and L.sub.2 ((x.sub.C, y+1), (x.sub.D, y+1)) are considered vertically connected if and only if

1. x.sub.A <x.sub.D and x.sub.B >x.sub.C (i.e. L.sub.1 and L.sub.2 overlap), and ##EQU1##

The transitive closure of all pairs of vertically connected line segments defines a connected component. There are many existing algorithms to compute transitive closure efficiently. In one embodiment, the present invention implements the algorithm disclosed in "Fundamentals of Data Structures in C.," E. Horowitz et al., Computer Science Press, 1993 for computing equivalence classes. The algorithm has a time complexity of O(M+N), where M is the number of line segments and N is the number of pairs of vertically connected line segments.

1.3 Mixed Reading Block Analysis 128

Usually a connected component contains only one reading block. However, there are a few cases where there is more than one reading block in a connected component. Table 6 is a typical example where several reading blocks are juxtaposed in the middle and the reading block at the top or bottom connects them together. The top or bottom reading block is so long that the principle of vertical connectedness does not help to break them from the left or right reading blocks.

TABLE 6 Mixed reading blocks -- "A friend in need is a friend in deed." -- Nematoilaah Shiri Office: LB 1041-1 Concordia University Tel: (514) 848-3033 1455 de Maisonneuve West Fax: (514) 848-2830 Montreal, Quebec, H3G 1M8 shiri@cs.concordia.ca URL http://www.cs.concordia.ca/.about.grad/shiri/

To detect the mixed reading block, line segment extraction 130 and connected component analysis 132 are performed on all background characters. Background characters are space characters and a background connected component is comprised of connected space characters. A background connected component is a separator if (1) at least one line segment of the background connected component is in the middle of the reading block, in other words, it does not touch the left or right margin of the reading block; and (2) the total height of the background connected component is greater than a threshold. Table 7 shows a case where the background connected component is a separator. (The background connected component is filled with "#")

TABLE 7 Background connected component which is a separator -- "A Friend in need is a friend in deed." -- Nematollaah Shiri############Office: LB 1041-1 Concordia University#########Tel: (514) 848-3033 1455 de Maisonneuve West#####Fax: (514) 848-2830 Montreal, Quebec, H3G 1M8####shiri@cs.concordia.ca URL http://www.cs.concordia.ca/.about.grad/shiri/

If a separator is found, the corresponding reading block is broken into three new blocks. The first new reading block contains line segments which are above the separator. The second new reading block contains line segments which are below the separator. The third one contains the remaining line segments from the old reading block. In fact, the first and second new reading blocks are the top and bottom block in the old reading block, respectively, and the third reading block contains all the juxtaposed blocks in the middle of the old reading block. After that, each new reading block undergoes connected component analysis 126 again. FIG. 4 illustrates the decomposition of such a reading block 162. The old reading block 162 from Table 7 is divided into new reading blocks 1621, 1622, and 1623 utilizing mixed reading block analysis 128. The third reading blocks 1623 is then further decomposed into reading blocks 16231 and 16232, utilizing the foreground connected component analysis 126. The reading blocks 1621, 1622, 16231, and 16232 are then input to language analysis 14, to produce functional blocks 18.

1.4 Remaining Errors

Few geometrical analysis algorithms perform at 100% accuracy. Both under-segmentation and over-segmentation errors may result from the geometrical analysis 12. In fact, most of them are not remediable unless lexical knowledge is applied. While the next stage, language analysis 14, serves to detect functional classes, the language analysis 14 also corrects the remaining segmentation errors by combining the geometrical analysis 12 with language constraints.

2. Language Analysis 14

The language analysis 14 breaks a reading block 16 into several functional blocks 18 and relates each functional block 18 with a functional class. The language analysis 14 is carried out using weighted finite state transducers (WFST) as shown in FIG. 5. First, cost estimation 142 is performed in order to obtain the cost of relating a line segment with each functional class. Then, an input WFST 144 is built, which incorporates all possible choices with their costs. The input WFST 144 is composed with a lexicon 146 and grammar 148 WFST and the functional class of each line segment is revealed from the optimal path in the composed WFST 150. The composed WFST 150 is input to a bestpath search 152 which produces a bestpath WFST 154. The bestpath WFST 154 then undergoes decoding 156, to produce the functional blocks 18.

A weighted finite state transducer (WFST) contains a set of states with a distinguished start state and one or more final states. Each state except the final state has a number of arcs to other states. Each arc has an input symbol, an output symbol, and a cost. FIG. 6 illustrates an exemplary lexicon WFST 146. A Finite State Acceptor (FSA) is a particular type of WFST, where the input symbol is identical to the output symbol on each arc, and where the cost on each arc is the free cost (usually 0), as shown in FIG. 7.

Following any path leading from the start state to the final state in a WFST, there is an input string (string of input symbols), an output string (string of output symbols), and a total cost (the sum of all costs on the path). The WFST is said to transduce the input string into the output string with the total cost.

The composition of two WFSTs is a new WFST such that if the first WFST transduces string s1 into s2 with cost c1 and the second WFST transduces string s2 into s3 with cost c2, the new WFST transduces s1 into s3 with cost c1+c2.

The bestpath search 152 searches a WFST for the optimal path leading from the start state to the final state in the sense that it has the minimum total cost. The bestpath is represented as a single path WFST, identified in FIG. 5 as bestpath WFST 154.

Conventional weighted finite state transducers and their properties and operations are generally described in U.S. Pat. No. 5,781,884.

WFSTs have been widely used in natural language processing. More recently, they have also shown to be powerful techniques for speech and handwriting recognition, where the recognition process is viewed as a cascade of weighted finite state transductions from the input signal sequence to a word or sentence in a given language. In the present invention, the process of language analysis is formalized as a cascade of transductions from line segments to functional blocks.

2.1 Cost Estimation 142

For each line segment in the reading block 16, there are a pair of neighboring nodes in the input WFST 144 connected by several arcs. On each arc, the input/output symbol represents a functional class and the cost reflects how likely the line segment is related to that functional class. In the present embodiment, ten functional classes are defined as shown in Table 8. In addition, two more symbols are used to represent the line break (L) and boundary between reading blocks (B).

TABLE 8 Functional Classes Symbol Functional Class Example E E-mail address rvs@research.bell-labs.com W Web address http://www.bell-labs.com/who/rvs P Phone number (908) 582-6456 F Fax number (908) 582-7308 N Personal name Richard W. Sproat A Postal address 700 Mountain Avenue, Murray Hill, NJ 07974-0646 T Title Associate Professor Q Quote "640K ought to be enough for everyone"- Bill Gates, 1980 S Stub home (following a phone number) M Miscellaneous text Address valid until Aug. 29, 1997

Text relating to the first four functional classes (e-mail address, web address, phone and fax numbers) has a relatively strict pattern. These classes are termed strict classes. The remaining six classes (personal name, postal address, quote, stub, and miscellaneous text) are termed loose classes since they have rather free styles. Cost estimation is quite different between strict classes and loose classes.

2.1.1. Cost Estimation for Strict Classes

Text belonging to strict classes is identified by regular expression matching. There are a number of ways to do regular expression matching in the C/C++ language. One may call the regex(3) library, but it is fairly primitive. Perl is very powerful in regular expression matching, but calling Perl from a C/C++ program is considerably more expensive. The preferred embodiment of the present invention uses a conventional finite state linguistic analysis package, such as the Lextools package which allows the specification of the cost for each symbol, and which enables the fine tuning of the "greediness" of the regular expression.

Different writing styles of e-mail address, web address, phone and fax numbers must be accounted for. Once the entire text in a line segment matches the regular expression, it is assigned a very low cost relating to the corresponding functional class and relatively high costs relating to all other classes.

Many under-segmentation errors resulting from geometrical analysis 12 for line segment extraction can be detected during the cost estimation of strict classes. Table 9 shows a typical under-segmentation error where the personal name is placed in the same line segment as the phone number because they are so close to each other.

TABLE 9 Under-segmentation error Tel: 908 582 1211 E-mail: Koen@research.bell-labs.com

This kind of error cannot be detected by the geometrical analysis 12 alone. To detect this error, after successfully matching the entire text against the regular expression for phone number, the matched phone number as well as keywords indicating a phone number (such as tel, phone, voice) are removed from the original text. The remaining text is checked for any alphanumerics. If any are found, this indicates that the line segment contains other text, because of an under-segmentation error. Then, re-segmentation is performed on the line segment by breaking the first segment at each word boundary. This would seem to lead to over-segmentation very easily, but that problem will be taken care of by the language directed segmentation algorithm to be discussed below.

2.1.2. Cost Estimation for Loose Classes

Since there are no strict patterns for text relating to loose classes, loose class text is mostly identified by some commonly observed conventions. For example, the first letter of each word is usually capitalized in names and addresses, but not in quotes or miscellaneous text; quotes are usually contained in quotation marks; digits tend to appear more frequently in addresses than other classes. Contrary to strict classes where the estimated costs are either low (for likely classes) or high (for unlikely classes), the confidence in identifying loose class text is much lower and the estimated costs among different functional classes do not differ as much.

Cost estimation for loose class text, as the name suggests, is not highly reliable due to their vague patterns. This especially causes trouble in distinguishing personal names from city names, since there are very few rules guiding the composition of personal names and in fact many personal names are easily confused with city names. Relying on a dictionary which contains most, if not all, personal names is impractical. As a result, the present invention proposes a personal name identification approach based on e-mail username.

2.1.3. Personal Name Identification

More often than not, the e-mail username is derived from the real personal name. The derivation often observes the following rules:

a username is constructed by concatenating letter strings directly or via any punctuation characters,

the letter strings must be prefixes of the first name, middle name, or family name, and

each of the first name, middle name, or family name may contribute zero or one prefix as a substring of the username.

Usernames constructed by these rules are termed well-formed usernames. For example, from personal name "Richard W. Sproat", "rws", "rwsproat", "richardsproat", "richs", "sproat" are all well-formed usernames, whereas "s_rws" is not.

It is easy to automatically construct a Finite State Acceptor (FSA) which enumerates all possible well-formed usernames from a given personal name. FIG. 7 shows such an FSA for personal name "Richard W. Sproat". Any usernames that are not in the FSA are not well-formed.

Sometimes, the middle initial appears in the username but is omitted in the written form of the personal name. For example, "Richard W. Sproat" is sometimes abbreviated as "Richard Sproat", but the initial "W" is retained in the username "rws". To cover the scenario where the middle initial is omitted from the personal name, all 26 letters are considered as candidates for the middle initial. FIG. 8 shows the well-formed username FSA from the personal name "Richard Sproat". Note that since the username is case insensitive, all letters in the personal name are changed to lowercase. All punctuation symbols in the username, if any, are removed before the username is matched against the FSA.

This technique is used to estimate if a candidate phrase is a personal name, given a well-formed username. First, a single path FSA which generates the username is constructed. Then, a well-formed username FSA from the candidate phrase (assuming it is a personal name) is generated and composed with the first FSA. If the final FSA is non-empty, it indicates that the phrase is a personal name and thus a low cost is assigned for it to be related to the personal name functional class. By this technique, personal names, which are a loose class, can be identified with relatively high confidence.

2.2 The Input WFST 144

An input WFST 144 is built for each reading block 16. For each line segment in the reading block 16, there are a pair of neighboring nodes in the WFST connected by several arcs. The input/output symbol of the arc represents a functional class and the cost indicates the likelihood that the line segment is related to that functional class. FIG. 9 shows a reading block 16 and its input WFST 144. Arcs whose symbols represent line breaks are removed from the input WFST 144 in FIG. 9 for ease of reading. Note that although in this example the input and output symbols on each arc are identical, they could be different due to encoding in the language directed segmentation algorithm which is discussed below. The WFST 144 is called an input WFST since it is the first in a cascade of WFSTs.

2.2.1 Language Directed Segmentation

Over-segmentation errors resulting from the geometric analysis 12 cause serious problems for the cost estimation 142 of line segments. A pattern in an entire line segment may not be carried by its individual words. For example, while "Richard Sproat" is identified as a personal name with regard to the username "rws" by the personal name identification algorithm, neither of the first name or family name alone can be identified in this way.

Since the over-segmentation problem cannot be solved by the geometrical analysis 12 alone, a language directed segmentation approach is proposed. For all of the line segments on the same line in a reading block, all possible segmentation positions are evaluated. In other words, to combine any two or more adjacent line segments on the same line into a new line segment and all the possible combinations are built into the input FST 144. Therefore, the input WFST 144 contains choices for not only functional class of each line segment but also segmentation positions on each line of the reading block 16. The best choices of both of them are to be determined together after the input WFST 144 is composed with the lexicon 146 and grammar 148 WFSTs.

For example, the text on a line is:

"Dr. Richard W. Sproat". A B C D

Since the words are written very far apart, this line is broken into four line segments A-D during the geometrical analysis 12, where each line segment contains only one word. In order to determine the best segmentation positions, the input WFST 144 in FIG. 10 is built, which enumerates all possible combinations of the four line segments (represented as A, B, C, and D respectively in FIG. 10). Each arc in FIG. 10 represents several actual arcs, where each actual arc is associated with a different functional class and its associated cost.

2.3 Bestpath Search 152

After the input WFST 144 is composed with the lexicon 146 and grammar 148 WFSTs, the bestpath search 152 is performed to find the functional class of each line segment (or combination of line segments). In order to trace back the segmentation positions, i.e. the combination of line segments, the input symbol in the input WFST 144 must be encoded to contain information on both functional class and number of combined line segments, as in the following:

input symbol=index of functional class+(number of combined line segments-1)*number of functional classes

The output symbol of the arc need not be encoded, as this is just the index of the functional class.

For example, assume that the indices of functional classes for e-mail address, web address, phone number, fax number, personal name, postal address, title, quote, stub, and miscellaneous text are from 1 to 10 respectively. If an arc represents the combination of 3 line segments related to a personal name, its input symbol is 3*10+5=35 and its output symbol is 5.

After the bestpath search on the composed WFST 150, each input symbol is decoded 156 to recover the functional class and the number of combined line segments by the following:

index of function classes=input symbol MOD number of functional classes+1

number of combined line segments=input symbol DIV number of functional classes.

The cost of combined line segments should be normalized to be comparable with the uncombined ones. In the bestpath search 152, the total cost is defined as the sum of all costs on the path. To be comparable, the cost of combined line segments is multiplied by the number of combinations.

The lexicon WFST 146 describes the construction of a functional block 18 from the line segments as illustrated in FIG. 6. For example, a complete postal address could be composed of one or more lines, where each line could in turn be composed of one or more line segments. However, a personal name is not usually written in more than one line. Such observations are incorporated in the lexicon WFST 144.

The grammar WFST 148 describes the construction of a reading block 11 from functional blocks 18, as shown in FIG. 11. To discourage transitions between different lexical units, a moderate cost is assigned to the backloop transition. The lexicon WFST 146 is separated from the grammar WFST 148 because they represent different levels of abstraction.

To determine the functional class of each line segment as well as the segmentation positions on each line, the input WFST 144 is composed with the lexicon 142 and grammar 148 WFSTs. By examining the optimal path in the compound WFST 150, adjacent line segments relating to the same functional class are grouped into one functional block 18 and therefore a reading block 16 is broken into several functional blocks 18.

3. Signature Block Identification

A simplified version of the geometrical 12 and language 14 analysis can be used for the identification of signature blocks of e-mail messages. In one application (an e-mail text-to-speech rendering system (Emu)), signature blocks are identified from the e-mail message by an N-gram character class model, which is not highly reliable, and a more accurate algorithm is necessary.

In the Emu system 1400, illustrated in FIG. 12, an e-mail message is first parsed into different regions (headers, quoted material, and signature blocks, among others), and these regions are marked with tags that indicate the regions' properties. The text block near the end of the e-mail message is submitted to the signature block identification and analysis apparatus 1404 for verification by the e-mail message analysis and markup component 1402. If the signature block is not verified, the block is returned to the e-mail message analysis and markup component 1402. If the signature block is verified, the marked up and analyzed signature block is returned to e-mail message analysis and markup component 1402 for incorporation into an e-mail document tree structure. The present invention is used in signature block identification and analysis apparatus 1404, first, to identify signature blocks 1406, and second to parse them into meaningful components 1408, 1410. Then a normalization of the text is computed by content normalization component 1412. The normalization performed largely involves the expansion of unusual "words" (such as WinNT), as well as e-mail addresses, URL's and other non-standard material. The output of the normalization is device independent in the sense that the normalization performed produce text that is appropriate as input to any (English) TTS system. Finally, the marked-up normalized text is rendered into audio by audio rendering component 1414.

In a signature block, an e-mail address, web address, phone and fax numbers, name, postal address, title and stub, are expected more often than miscellaneous text (miscellaneous text is distinguished by high percentage of words that do not begin with uppercase letters); while in a non-signature block, the opposite is usually true. Quotes are assumed to appear equally frequently between signature blocks and non-signature blocks.

This observation is reflected in the WFST 170 illustrated in FIG. 13. Starting from the source node 172, there is one path 172 leading to the signature block and another path 174 leading to non-signature block. In the path 172 to the signature block, miscellaneous text is penalized by being assigned a high cost while all other functional classes are encouraged by being assigned low costs. This is opposite in the path 174 to non-signature block where miscellaneous text is encouraged and all other classes are discouraged.

The geometrical analysis 12 and language analysis 14 are performed on each unknown text region. As shown in FIG. 14, which is a specific implementation of the processing illustrated in FIG. 5, an input WFST 144 is constructed and composed with the identification WFST 170 in FIG. 13. The optimal path in the composed WFST 150 indicates whether the unknown text region is a signature block.

The foregoing merely illustrates the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the invention and are thus within its spirit and scope.

* * * * *

References


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed